Posted in Oracle

Applied Oracle Security: Developing Secure Database and by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth,

By David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise

Cutting-edge suggestions from major Oracle protection experts

This Oracle Press consultant demonstrates functional purposes of the main compelling equipment for constructing safe Oracle database and middleware environments. you can find complete assurance of the newest and most well liked Oracle items, together with Oracle Database and Audit Vaults, Oracle software exhibit, and safe company Intelligence applications.

Applied Oracle Security demonstrates how to construct and gather some of the Oracle applied sciences required to create the delicate functions demanded in modern day IT international. so much technical references merely talk about a unmarried product or product suite. As such, there's no roadmap to provide an explanation for the best way to get one product, product-family, or suite to paintings with one other. This publication fills that void with admire to Oracle Middleware and Database items and the world of protection.

Show description

Read Online or Download Applied Oracle Security: Developing Secure Database and Middleware Environments PDF

Best oracle books

Beginning Oracle Programming

Oracle is the world's major relational database. It presents a wealthy atmosphere to shop, deal with, and extract facts. whilst used appropriately, Oracle offers a great origin upon which to construct company scale purposes. getting to know the Oracle database isn't an in a single day activity. It takes time, perform, and many actual global event.

By Thomas Kyte - Expert Oracle Database Architecture (3rd Edition) (2014-11-20) [Paperback]

Now in its 3rd version, this best-selling ebook keeps to deliver you the very best pondering on find out how to follow Oracle Database to provide scalable functions that practice good and bring right effects. Tom Kyte and Darl Kuhn proportion an easy philosophy: "you can deal with Oracle as a black field and simply stick facts into it, otherwise you can know how it really works and take advantage of it as a robust computing setting.

Expert Oracle Exadata

Specialist Oracle Exadata, 2d version opens up the internals of Oracle's Exadata platform that you should totally enjoy the so much performant and scalable database equipment able to operating Oracle Database. This version is fully-updated to hide Exadata 5-2 and Oracle Database 12c. in case you are new to Exadata, you will soon research that it embodies a transformation in the way you take into consideration and deal with relational databases.

Additional info for Applied Oracle Security: Developing Secure Database and Middleware Environments

Example text

NOTE Encryption protects sensitive data for an unprotected medium. In today’s interconnected world, encryption is widely used because it clearly meets the criteria for which it was designed: encryption protects sensitive data passing through the unprotected Internet. Many security professionals have extensive experience in the network security realm and a strong understanding of cryptography. This is one reason encryption is so popular today. Databases and database security are significantly different from networks and network security.

As you can see in Figure 1-1 for a Sales History (SH) schema, you should not allow application users to connect to the database by way of the SH schema. If you do, nothing in the database will prevent users from mutilating the data structures and basically having their way with everything contained within the SH. Obviously, your application would need to provide some sort of security, but even with some security present, allowing user to access the database via the schema is a bad idea. User Access Accounts User access accounts are the schemas in which end users connect to the database.

Security in layers has an analogous benefit. A removal of one layer—say, by compromise—does not expose the entire system. When you look at how to apply security, you want to look at incorporating multiple layers whenever it makes sense to do so. There is no such thing as being too secure (which should not be confused with too cumbersome a security implementation to be usable). Of all the things that compete with a security implementation, other security implementations should not be one of them.

Download PDF sample

Rated 4.93 of 5 – based on 4 votes